Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Cisco ACI Cookbook
  • Table Of Contents Toc
  • Feedback & Rating feedback
Cisco ACI Cookbook

Cisco ACI Cookbook

By : Fordham
3.1 (7)
close
close
Cisco ACI Cookbook

Cisco ACI Cookbook

3.1 (7)
By: Fordham

Overview of this book

Cisco Application Centric Infrastructure (ACI) is a tough architecture that automates IT tasks and accelerates data-center application deployments. This book focuses on practical recipes to help you quickly build, manage, and customize hybrid environment for your organization using Cisco ACI. You will begin by understanding the Cisco ACI architecture and its major components. You will then configure Cisco ACI policies and tenants. Next you will connect to hypervisors and other third-party devices. Moving on, you will configure routing to external networks and within ACI tenants and also learn to secure ACI through RBAC. Furthermore, you will understand how to set up quality of service and network programming with REST, XML, Python and so on. Finally you will learn to monitor and troubleshoot ACI in the event of any issues that arise. By the end of the book, you will gain have mastered automating your IT tasks and accelerating the deployment of your applications.
Table of Contents (11 chapters)
close
close

Creating local users


Local users are the easiest way to start segregating users and leveraging some form of accountability. We will have a bigger administrative overhead, and clearly, this would not be the preferred solution. Instead, one would look to a centralized system, such as RADIUS or LDAP. However, local users are a good place for us to start.

How to do it...

  1. Navigate to Admin | AAA | Security Management | Local Users.
  1. Click on Actions | Create Local User.
  2. Select a Security Domain, or leave it at the default (all unticked).
  1. Click on NEXT.
  2. Enter the Login ID and the Password, and fill in any other fields if desired.
  1. Click on FINISH.

How it works...

We can test the new user's access by connecting to the APIC with SSH:

The connection is successful. But what if need to limit access to a particular tenant? For that, we need to create a security domain.

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY